[1]陈永锋,宋 楠.分布式信息管理系统混合加密优化研究[J].西安建筑科技大学学报:自然科学版,2015,47(02):293-296.[doi::10.15986/j.1006-7930.2015.02.0026]
 CHEN Yongfeng,SONG Nan. Optimization and research on hybrid encryption of distributedinformation management system[J].J.Xi’an Univ. of Arch. & Tech.:Natural Science Edition,2015,47(02):293-296.[doi::10.15986/j.1006-7930.2015.02.0026]
点击复制

分布式信息管理系统混合加密优化研究()
分享到:

西安建筑科技大学学报:自然科学版[ISSN:1006-7930/CN:61-1295/TU]

卷:
47
期数:
2015年02期
页码:
293-296
栏目:
出版日期:
2015-04-28

文章信息/Info

Title:
 Optimization and research on hybrid encryption of distributed
information management system
文章编号:
1006-7930(2015)02-0293-04
作者:
陈永锋宋 楠
(西安建筑科技大学管理学院,陕西 西安 710055)
Author(s):
CHEN Yongfeng SONG Nan
(Xi’an Univ. of arch. & Tech., Xi’an 710055, china)
关键词:
分布式信息管理系统混合加密RSA 优化中国剩余定理
Keywords:
Distributed information management system hybrid encryption RSA optimization CRT
分类号:
TU45
DOI:
:10.15986/j.1006-7930.2015.02.0026
文献标志码:
A
摘要:
基于分布式信息管理系统大量高效安全的数据传输要求,针对密钥管理和认证安全的问题提出混合加密算法进行数
据加密.混合加密算法使用基于RSA 算法的密钥管理方式和身份认证体系,并使用二进制编码、CRT 定理、费马定理和小
数筛选等方法进行优化.最终构造一个既满足密钥管理与消息认证,又有较高的运算效率的混合加密体系.实验结果表明优
化后RSA 算法效率明显提升,混合加密体系具有可靠地安全性与可行性.
Abstract:
Based on the requirements of efficiency and security on data transmission of distributed information management system,
aiming at the key management and authentication security problem this paper put forward the hybrid encryption algorithm
for data encryption. Hybrid encryption algorithm applied the key management and identity authentication system based on RSA algorithm,
and optimized it by binary code, CRT theorem, Fermat theorem, decimal screening method and so on. Finally it has constructing
a hybrid encryption system with satisfies key management and high operational efficiency. Experiments show that
the optimized RSA algorithm efficiency improved significantly, the hybrid encryption system has reliable safety and higher practicability.

参考文献/References:

参考文献 References
[1] 杨波. 现代密码学[M]. 北京: 清华大学出版社, 2007.
YANG Bo. Modern cryptography[M]. Beijing: Tsinghua
University press, 2007.
[2] 陈恭亮. 信息安全数学基础[M]. 北京: 清华大学出版
社, 2011.
CHEN Gongliang. Mathematical foundations of information
security[M]. Beijing: Tsinghua University press, 2011.
[3] STALLINGS W. The advanced encryption standard[J].
Cryptologia, 2010, 26(3): 165-188.
[4] JAMIL T. The rijndael algorithm[J]. Potentials, 2004,
23(2): 36-38.
[5] RIVEST R L. The RC5 encryption algorithm[J]. Springer
Berlin Heidelberg, 1995: 86-96.
[6] RIVEST R L, SHAMIR A. A method for obtaining digital
signatures and public key cryptosystems[J]. Communications
of the Association for Computer Machinery, 1978,
21(2): 120-126.
[7] WIENER M J. Cryptanalysis of short RSA secret exponents[J].
IEEE Information Theory Society, 1990, 36(3): 553-558.
[8] BONEH D, DURFEE G. Cryptanalysis of RSA with
private key d less than N0. 292[J]. IEEE Information
Theory Society, 2000, 46(4): 1339-1349.
[9] WANG Xiaoyun, YU Hongbo. How to Break MD5 and
Other Hash Functions[J]. Cryptologia, 2005, 251(7): 357-362.
[10] 饶进平, 冯登国. 高速RSA 处理芯片的研究与实现[J].
计算机工程与应用, 2003, 39(5): 139-141.
RAO Jinping, FENG Dengguo. Research and Implementation
of High Speed RSA Crypto Chip[J]. Computer engineering
and Applications, 2003, 39(5): 139-141.
[11] 王琴琴, 陈相宁. Montgomery 算法在RSA中的应用及其
优化[J]. 计算机技术与发展, 2007, 17(6): 145-146, 150.
WANG Qinqin, CHEN Xiangning. Optimization and Application
of Montgomery Algorithm in RSA[J]. Computer
Technology and Development, 2007, 17(6): 145-146, 150.
[12] 王安. RSA 公钥密码算法的快速实现[D]. 济南: 山东
大学, 2008.
WANG An. Fast implementation of RSA public key
cryptosystem[D]. Jinan: Shandong University, 2008.
[13] 贺克英. 改进的RSA 算法实现研究[D]. 成都: 电子科
技大学, 2010.
HE Keying. Research and implementation of the improved
RSA algorithm[D]. Chengdu: University of Electronic
Science and technology of China, 2010.
[14] YEN Sungming, KIM Seungjoo, LIM Seongan. RSA
Speedup with Chinese Remainder Theorem Immune
against Hardware Fault Cryptanalysis[J]. IEEE Transactions
on computers, 2003, 52(4): 461-472.
[15] 费晓飞, 胡捍英. CRT-RSA算法安全性分析[J]. 微计算
机信息, 2009, 25(3): 38, 54-55.
FEI Xiaofei, HU Hanying. Security of CRT based RSA Algorithm[
J]. Micro computer information, 2009, 25(3): 38, 54-55.
[16] 张宝华, 殷新春. RSA 密码算法的安全及有效实现[J].
中山大学学报: 自然科学版, 2008, 40(6): 22-26.
ZHANG Baohua, YIN Xinchun. The safe and efficient
implementation of RSA algorithm[J]. ACTA
Scientiarum Naturalium Universitatis Sunyatseni: Sci. &
Tech. , 2008, 40(6): 22-26.
[17] 石井, 吴哲, 谭璐, 等. RSA 数据加密算法的分析与改进
[J]. 济南大学学报: 自然科学版, 2013, 27(3): 283-286.
SHI Jing, WU Zhe, TAN Lu, et al. Analysis and Improvement
of RSA Data Encryption Algorithm[J]. Journal
of University of Jinan: Sci. & Tech. , 2008, 40(6): 22-26.
[18] 肖振久, 胡驰, 姜正涛. AES 与RSA 算法优化及其混合加
密体制[J]. 计算机应用研究, 2014, 31(4): 1189-1194.
XIAO Zhenjiu, HU Chi, JIANG Zhengtao. Optimization of
AES and RSA algorithm and its mixed encryption system[J].
Application Research of Computers, 2014, 31(4): 1189-1194.
[19] 刘学军, 邢玲玲, 林和平, 等. Miller-Rabin 素数检测优
化算法研究与实现[J]. 信息技术, 2008(12): 141-143.
LIU Xuejun, XING Lingling. Research and realization of
Miller-Rabin optimizing algorithm for prime testing[J].
Information Technology, 2008(12): 141-143.

备注/Memo

备注/Memo:
收稿日期:2014-10-08 修改稿日期:2015-04-01
基金项目:国家自然科学基金项目(61271278)
作者简介:陈永锋(1962-),男,博士,教授,主要研究网络安全.E-mail: chenyf@xauat.edu.cn
更新日期/Last Update: 2015-09-25